Anonymous identity-based broadcast encryption with chosen-ciphertext security

Kai He, Jian Weng, Jia-Nan Liu, Joseph K. Liu, Wei Liu, Robert H Deng

    Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

    Abstract

    In this paper, we propose the first identity-based broadcast encryption scheme, which can simultaneously achieves confidentiality and full anonymity against adaptive chosen-ciphertext attacks under a standard assumption. In addition, two further desirable features are also provided: one is fully-collusion resistant which means that even if all users outside of receivers S collude they cannot obtain any information about the plaintext. The other one is stateless which means that the users in the system do not need to update their private keys when the other users join or leave the system. In particular, our scheme is highly efficient, where the public parameters size, the private key size and the decryption cost are all independent to the number of the receivers.

    Original languageEnglish
    Title of host publicationASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security
    Subtitle of host publicationMay 30–June 3, 2016, Xi’an, China
    EditorsXiaoFeng Wang, Xinyi Huang
    Place of PublicationNew York, NY
    PublisherAssociation for Computing Machinery (ACM)
    Pages247-255
    Number of pages9
    ISBN (Electronic)9781450342339
    DOIs
    Publication statusPublished - 30 May 2016
    EventACM Symposium on Information, Computer and Communications Security 2016 - Xi'an, China
    Duration: 30 May 20163 Jun 2016
    Conference number: 11
    http://meeting.xidian.edu.cn/conference/AsiaCCS2016/

    Conference

    ConferenceACM Symposium on Information, Computer and Communications Security 2016
    Abbreviated titleAsiaCCS 2016
    CountryChina
    CityXi'an
    Period30/05/163/06/16
    Internet address

    Keywords

    • Adaptive chosen-ciphertext security
    • Anonymous
    • Identity-based broadcast encryption
    • Random oracle model
    • Weakly robust

    Cite this

    He, K., Weng, J., Liu, J-N., Liu, J. K., Liu, W., & Deng, R. H. (2016). Anonymous identity-based broadcast encryption with chosen-ciphertext security. In X. Wang, & X. Huang (Eds.), ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security: May 30–June 3, 2016, Xi’an, China (pp. 247-255). New York, NY: Association for Computing Machinery (ACM). https://doi.org/10.1145/2897845.2897879
    He, Kai ; Weng, Jian ; Liu, Jia-Nan ; Liu, Joseph K. ; Liu, Wei ; Deng, Robert H. / Anonymous identity-based broadcast encryption with chosen-ciphertext security. ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security: May 30–June 3, 2016, Xi’an, China. editor / XiaoFeng Wang ; Xinyi Huang. New York, NY : Association for Computing Machinery (ACM), 2016. pp. 247-255
    @inproceedings{0c90402ce9834b1bb723fd598abfa07d,
    title = "Anonymous identity-based broadcast encryption with chosen-ciphertext security",
    abstract = "In this paper, we propose the first identity-based broadcast encryption scheme, which can simultaneously achieves confidentiality and full anonymity against adaptive chosen-ciphertext attacks under a standard assumption. In addition, two further desirable features are also provided: one is fully-collusion resistant which means that even if all users outside of receivers S collude they cannot obtain any information about the plaintext. The other one is stateless which means that the users in the system do not need to update their private keys when the other users join or leave the system. In particular, our scheme is highly efficient, where the public parameters size, the private key size and the decryption cost are all independent to the number of the receivers.",
    keywords = "Adaptive chosen-ciphertext security, Anonymous, Identity-based broadcast encryption, Random oracle model, Weakly robust",
    author = "Kai He and Jian Weng and Jia-Nan Liu and Liu, {Joseph K.} and Wei Liu and Deng, {Robert H}",
    year = "2016",
    month = "5",
    day = "30",
    doi = "10.1145/2897845.2897879",
    language = "English",
    pages = "247--255",
    editor = "XiaoFeng Wang and Huang, {Xinyi }",
    booktitle = "ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security",
    publisher = "Association for Computing Machinery (ACM)",
    address = "United States of America",

    }

    He, K, Weng, J, Liu, J-N, Liu, JK, Liu, W & Deng, RH 2016, Anonymous identity-based broadcast encryption with chosen-ciphertext security. in X Wang & X Huang (eds), ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security: May 30–June 3, 2016, Xi’an, China. Association for Computing Machinery (ACM), New York, NY, pp. 247-255, ACM Symposium on Information, Computer and Communications Security 2016, Xi'an, China, 30/05/16. https://doi.org/10.1145/2897845.2897879

    Anonymous identity-based broadcast encryption with chosen-ciphertext security. / He, Kai; Weng, Jian; Liu, Jia-Nan; Liu, Joseph K.; Liu, Wei; Deng, Robert H.

    ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security: May 30–June 3, 2016, Xi’an, China. ed. / XiaoFeng Wang; Xinyi Huang. New York, NY : Association for Computing Machinery (ACM), 2016. p. 247-255.

    Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

    TY - GEN

    T1 - Anonymous identity-based broadcast encryption with chosen-ciphertext security

    AU - He, Kai

    AU - Weng, Jian

    AU - Liu, Jia-Nan

    AU - Liu, Joseph K.

    AU - Liu, Wei

    AU - Deng, Robert H

    PY - 2016/5/30

    Y1 - 2016/5/30

    N2 - In this paper, we propose the first identity-based broadcast encryption scheme, which can simultaneously achieves confidentiality and full anonymity against adaptive chosen-ciphertext attacks under a standard assumption. In addition, two further desirable features are also provided: one is fully-collusion resistant which means that even if all users outside of receivers S collude they cannot obtain any information about the plaintext. The other one is stateless which means that the users in the system do not need to update their private keys when the other users join or leave the system. In particular, our scheme is highly efficient, where the public parameters size, the private key size and the decryption cost are all independent to the number of the receivers.

    AB - In this paper, we propose the first identity-based broadcast encryption scheme, which can simultaneously achieves confidentiality and full anonymity against adaptive chosen-ciphertext attacks under a standard assumption. In addition, two further desirable features are also provided: one is fully-collusion resistant which means that even if all users outside of receivers S collude they cannot obtain any information about the plaintext. The other one is stateless which means that the users in the system do not need to update their private keys when the other users join or leave the system. In particular, our scheme is highly efficient, where the public parameters size, the private key size and the decryption cost are all independent to the number of the receivers.

    KW - Adaptive chosen-ciphertext security

    KW - Anonymous

    KW - Identity-based broadcast encryption

    KW - Random oracle model

    KW - Weakly robust

    UR - http://www.scopus.com/inward/record.url?scp=84979674783&partnerID=8YFLogxK

    U2 - 10.1145/2897845.2897879

    DO - 10.1145/2897845.2897879

    M3 - Conference Paper

    SP - 247

    EP - 255

    BT - ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security

    A2 - Wang, XiaoFeng

    A2 - Huang, Xinyi

    PB - Association for Computing Machinery (ACM)

    CY - New York, NY

    ER -

    He K, Weng J, Liu J-N, Liu JK, Liu W, Deng RH. Anonymous identity-based broadcast encryption with chosen-ciphertext security. In Wang X, Huang X, editors, ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security: May 30–June 3, 2016, Xi’an, China. New York, NY: Association for Computing Machinery (ACM). 2016. p. 247-255 https://doi.org/10.1145/2897845.2897879